[Dshield] IRC BOT opportunity

David Taylor ltr at isc.upenn.edu
Wed Oct 12 20:04:06 GMT 2005


The information these people give you that control these bot networks is
amazing.  I enjoy doing this when I have free time as well.

You might want to do some research on the legal aspect of what you are
thinking of doing as far as developing the client which would dismantle the
Bot network.  Sounds like it could get you in a lot of trouble!


==================================================
David Taylor //Sr. Information Security Specialist
University of Pennsylvania Information Security 
Philadelphia PA USA
(215) 898-1236
http://www.upenn.edu/computing/security/
================================================== 

SANS - The Twenty Most Critical Internet Security Vulnerabilities 
http://www.sans.org/top20/

SANS - Internet Storm Center
http://isc.sans.org

irc.freenode.net #dshielders
http://freenode.net/



-----Original Message-----
From: list-bounces at lists.dshield.org [mailto:list-bounces at lists.dshield.org]
On Behalf Of Halsall, Mike
Sent: Wednesday, October 12, 2005 3:49 PM
To: General DShield Discussion List
Subject: [Dshield] IRC BOT opportunity



Question of the day:

Recently I've been playing with an IRC BOT virus (a Randex variant) that
has come onto my college's campus.  These viruses have become
increasingly sophisticated in their capabilities and have the ability
to, of course, receive a download command from their Op and go grab a
file and run it silently - hence introducing (yet) another ingress path
for more malware/viruses.

Being curious, and taking the appropriate precautions (anonymous proxies
through Tor), I hopped onto the IRC server these Bots were joining and
made myself look like one of them.  This server, in Hungary, controls
~17000 Bots.

Over the past few days I've struck up conversations with the Ops (3 of
them), finally talking to their leader.  None of them are all too
technical, they don't code and are just into this to make money (through
spam (maybe some extortion?)).  In my conversation last night, I let the
leader know that I am a capable programmer (c/c++ skills) and know
networks.  He asked me to write them a new client, saying that he was
sick of this IRC based net and having to move every so often due to
being shut down (which does no good, because he still retains his Bots).
He says he has a friend with a really large Botnet that uses a
distributed P2P model.

I see an opportunity here.  Not a big one.  Not changing the world.  But
a fun project, nonetheless.  Write a new client for them that isn't IRC
based.  Get them to push this new client to their Bots.  Having written
the code, I can then break apart Botnet from the inside - not giving
them a chance to just hop to another host and even let the victims know
their machines are infected.  Also, it gives opportunity to find out who
these people are (they're in the States).

I'd let certain organizations know what I would be doing (CERT, for
instance) and pass them the source when it was ready to roll.  However,
before doing anything, I'd love to hear what you think.  Let the ethical
debate begin!

Mike


_________________________________________
Using .Net? Need to know more about .Net Security?
http://isc.sans.org/banner_count.php?dest=dotnet

_______________________________________________
send all posts to list at lists.dshield.org
To change your subscription options (or unsubscribe), see:
http://www.dshield.org/mailman/listinfo/list




More information about the list mailing list